osint (@osintcookie) 's Twitter Profile
osint

@osintcookie

ID: 1892115607706886144

calendar_today19-02-2025 07:35:30

219 Tweet

6 Followers

169 Following

elvis (@omarsar0) 's Twitter Profile Photo

This book is brilliant! It's a fun way to learn and explore maths with Python. This is exactly the way I learnt ML and neural networks back in my PhD days.

This book is brilliant!

It's a fun way to learn and explore maths with Python.

This is exactly the way I learnt ML and neural networks back in my PhD days.
NetAskari (@netaskari) 's Twitter Profile Photo

We got our hand on a Chinese DLP program the government and national security agencies use to monitor state employees computers for leakage and usage of confidential documents. Meet 保密管理系统. 1/9

We got our hand on a Chinese DLP program the government and national security agencies use to monitor state employees computers for leakage and usage of confidential documents. Meet 保密管理系统. 1/9
安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

i'm shaking so badly right now from this anxiety attack i NEED TO TALK TO SOMEONE AT TWITCH THIS INSTANT you HAVE MY TAX INFORMATION AS AN AFFILIATE WHAT DO YOU MEAN

i'm shaking so badly right now from this anxiety attack

i NEED TO TALK TO SOMEONE AT TWITCH THIS INSTANT
you HAVE MY TAX INFORMATION AS AN AFFILIATE WHAT DO YOU MEAN
Akhilesh Mishra (@livingdevops) 's Twitter Profile Photo

Shell scripting is the one skill that separates DevOps engineers who panic during incidents from those who fix them in minutes. I spent 8 years in Linux before I got into DevOps. I wrote a minimalistic ebook on Linux shell scripting that will give you enough knowledge to start

Shell scripting is the one skill that separates DevOps engineers who panic during incidents from those who fix them in minutes.

I spent 8 years in Linux before I got into DevOps.

I wrote a minimalistic ebook on Linux shell scripting that will give you enough knowledge to start
IT Guy (@t3chfalcon) 's Twitter Profile Photo

*Flashback to my old tweet. You think running "Portable Chrome" or "Hacker Tools" from a USB drive keeps you invisible. It doesn't. The second you plug that drive in, Windows logs the Volume Serial Number to the Registry. When the Forensice analyst (or Feds) audit that

*Flashback to my old tweet.

You think running "Portable Chrome" or "Hacker Tools" from a USB drive keeps you invisible.

It doesn't.

The second you plug that drive in, Windows logs the Volume Serial Number to the Registry.

When the Forensice analyst (or Feds) audit that
Uriel Kosayev (@malfuzzer) 's Twitter Profile Photo

Malware analysis is not only about code. It’s also about the psychology of the attacker and the malware developer. Code reflects decisions: – what was rushed – what was reused – what was avoided – what was over-engineered Those decisions often reveal more than the code itself.

Malware analysis is not only about code.
It’s also about the psychology of the attacker and the malware developer.

Code reflects decisions:
– what was rushed
– what was reused
– what was avoided
– what was over-engineered

Those decisions often reveal more than the code itself.
vx-underground (@vxunderground) 's Twitter Profile Photo

Today the United States sanctioned Sergey Zelenyuk, and his company Matrix LLC, notably for "acquiring at least eight proprietary cyber tools exclusive to the United States government". Want to guess what those tools were? See image two! Info via John Scott-Railton

Today the United States sanctioned Sergey Zelenyuk, and his company Matrix LLC, notably for "acquiring at least eight proprietary cyber tools exclusive to the United States government".

Want to guess what those tools were? See image two!

Info via <a href="/jsrailton/">John Scott-Railton</a>
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Chinese APTs hunting playbook. A field manual providing detection strategies for specific Chinese actors (ex. APT41) with detailed common TTPs. A post by SIMKARA. Source: detect.fyi/playbook-hunti… #redteam #blueteam #maldev #malwaredevelopment

riddle (@riddll3) 's Twitter Profile Photo

Hi guys, I just deployed a platform I’ve been working on and would love for you to give it a try. TRACEON.re is a free real-time Telegram threat intelligence platform. I’ve indexed over 70M messages. You can search, filter and export data. I’m working on more

Hi guys,

I just deployed a platform I’ve been working on and would love for you to give it a try.

TRACEON.re is a free real-time Telegram threat intelligence platform. I’ve indexed over 70M messages.

You can search, filter and export data.

I’m working on more
vxdb (@vxdb) 's Twitter Profile Photo

If you wanna stay on top of cybersecurity news, you need these sites in your RSS reader BleepingComputer DarkReading RecordedFuture - The Record SecurityWeek DataBreachedNet TheRegister HackerNews (hit or miss) KrebsOnSecurity 404Media ArsTechnica TechDirt